News and information on the misuse of technology for political reasons.
Politically motivated computer crime covers a wide range of activity promoting the objectives of individuals, groups or nations supporting a variety of causes such as: Anti-globalization, trans-national conflicts and protest.

Friday, March 12, 2010

The LA Times reports on the extensive and effective use of the Internet by traditional terrorist organizations:

"From charismatic clerics who spout hate online, to thousands of extremist websites, chat rooms and social networking pages that raise money and spread radical propaganda, the Internet has become a crucial front in the ever-shifting war on terrorism."

The article also discusses using the Internet for terrorist training activities:

"The new militancy is driven by the Web," agreed Fawaz A. Gerges, a terrorism expert at the London School of Economics. "The terror training camps in Afghanistan and Pakistan are being replaced by virtual camps on the Web."

About Kent Anderson

Kent Anderson has more than 24 years of experience in security and is Managing Director of Encurve, LLC.
Mr. Anderson is a recognized expert on security and politically motivated computer crime and has been quoted by numerous publications including the Washington Post, WSJ, CNN, AP, Reuters, USA Today, LA Business Daily, Singapore Business Times, Danish National Radio and the BBC.
He has held positions as Senior VP of IT Security and Investigations with an international risk consultancy, as Director of Analysis & Investigations with PwC and as the European Info Security Manager for Digital Equipment Corporation.
He has provided assistance to law enforcement and government agencies including the FBI, US Secret Service, DoD, DoJ, FLETC, Scotland Yard, The German BKA, the Russian MVD and Norwegian, Danish and Swiss police. He provided consulting to OECD on international harmonization of computer crime laws and the British Parliament on the development of the UK’s Computer Misuse Act.
Mr. Anderson is a Certified Information Security Manager. He has served on Motorola’s Research Visionary Board for Security, and ISACA’s Security Management Advisory Board.